| Name | CVE-2025-59378 |
| Description | In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended). |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1115303 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| guix (PTS) | bullseye | 1.2.0-4+deb11u2 | vulnerable |
| bullseye (security) | 1.2.0-4+deb11u3 | vulnerable | |
| sid | 1.4.0-9 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| guix | source | (unstable) | (unfixed) | 1115303 |
https://guix.gnu.org/en/blog/2025/privilege-escalation-vulnerability-2025-2/
https://codeberg.org/guix/guix/pulls/2419
Fixed by: https://codeberg.org/guix/guix/commit/2a333541e8f1907ae0bc80cf500a99567ca46d08
Fixed by: https://codeberg.org/guix/guix/commit/f607aaaaaafe19257ef09ca519d325df6ae97e05
Fixed by: https://codeberg.org/guix/guix/commit/9202921e812708b23788b2209cdb576d456f56db